DocumentCode :
3088647
Title :
Empirical Survey: Experimentation and Implementations of High Speed Protocol Data Transfer for GRID
Author :
Bernardo, Danilo Valeros ; Hoang, Doan B.
Author_Institution :
i-Next Fac. of Eng. & Inf. Technol., Univ. of Technol. Sydney, Sydney, NSW, Australia
fYear :
2011
fDate :
22-25 March 2011
Firstpage :
335
Lastpage :
340
Abstract :
Many TCP protocol variants have demonstrated better performance in simulation and several limited network experiments. However, practical use in real applications of these protocols is still very limited because of the implementation and installation difficulties. On the other hand, users who need to transfer bulk data (e.g., ingrid/cloud computing) usually turn to application level solutions where these variants do not fair well. Among protocols considered in the application level solutions are UDP-based protocols, such as UDT (UDP-based DataTransport Protocol). UDT is considered one of the most recently developed new transport protocols with congestion control algorithms. It was developed to support next generation high-speed networks, including wide area optical networks. It is considered a state-of-the-art protocol, which promptly addresses various infrastructure requirements for transmitting data in high-speed networks. Its development, however, creates new vulnerabilities because like many other protocols, it is designed to rely solely on existing security mechanisms for existing protocols such as the Transmission Control Protocol (TCP) and User Datagram Protocol (UDP). Some of these security mechanisms cannot be used to absolutely protect UDT, just as security mechanisms devised for wired networks cannot be used to protect unwired ones. Both the recently developed UDT and the decades-old TCP/UDP lack a well-thought-out security architecture that addresses problems in today´snetworks. In this paper, we extend our previous work and implement our developed security methodology that can assist network and security investigators, designers, and users who consider and incorporate security when implementing UDT across wide area networks. These can support security architectural designs of UDP-based protocols as well as assist in the future development of other state-of-the-art fast data transfer protocols.
Keywords :
computer networks; grid computing; security of data; transport protocols; TCP protocol; UDP based data transport protocol; fast data transfer protocol; grid computing; high speed protocol data transfer; security architecture; security methodology; user datagram protocol; Encryption; High-speed networks; IP networks; Logic gates; Protocols; High Speed Networks; Protocols; UDT; WOAN;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Advanced Information Networking and Applications (WAINA), 2011 IEEE Workshops of International Conference on
Conference_Location :
Biopolis
Print_ISBN :
978-1-61284-829-7
Electronic_ISBN :
978-0-7695-4338-3
Type :
conf
DOI :
10.1109/WAINA.2011.42
Filename :
5763523
Link To Document :
بازگشت